November 28, 2017
The Scarab ransomware received an upgrade, and researchers have seen it being spread via the Necurs botnet, meaning the malware can spread to millions in a handful of hours.
June 16, 2017
News roundup: DeltaCharlie malware is a threat to the U.S., according to a US-CERT warning about Hidden Cobra. Plus, a DVR flaw could create a bigger botnet than Mirai, and more.
April 07, 2017
Bad-bots are being used by cybercriminals to automate many time-consuming activities to perpetrate their crimes. Payment card fraud is an area of particular concern as large data bases of stolen ...
March 31, 2017
News roundup: HTTPS traffic has yet to surge, despite its security benefits, according to a report. Plus, the latest in the Apple extortion; a Mirai attack lasted 54 hours; and more.
Botnet Get Started
Bring yourself up to speed with our introductory content
In this excerpt from chapter seven of Advanced Persistent Security, authors Araceli Treu Gomes and Ira Winkler discuss the different threats facing organizations. Continue Reading
An ad fraud botnet is a distributed network of computers controlled by a botmaster to defraud advertisers. Continue Reading
Command and control servers (C&C servers) are computers that issue commands to members of a botnet. Botnet members may be referred to a zombies and the botnet itself may be referred to as a zombie army. Continue Reading
Evaluate Botnet Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A recent survey shed light on where IoT security issues currently stand; an overwhelming 90% of consumers lack confidence in the security of IoT devices. Continue Reading
Fortinet's Derek Manky explains what Hivenet attacks are, how they differs from traditional botnets and what they mean to IoT security. Continue Reading
A San Francisco firm is using bots to track public profile changes of clients on LinkedIn. The monitoring is being challenged in court and may impact employee privacy practices. Continue Reading
Learn to apply best practices and optimize your operations.
Hivenets, an emerging type IoT attack using swarm technology, are changing the game for cybercriminals. Here's how organizations should plan and respond. Continue Reading
A security researcher recently discovered a list of 711 million records used by the Onliner spambot. Expert Matt Pascucci explains what actions exposed individuals should take. Continue Reading
Given the sheer variety of IoT devices and opportunities to exploit them, IoT attack trends will develop in several directions. Continue Reading
Problem Solve Botnet Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
By making IoT devices more resistant to hijacking attempts, we can successfully deprive botnets of unprotected endpoints and effectively mitigate DDoS attacks. Continue Reading
To avoid a mobile device catastrophe, several large tech organizations came together to stop the WireX botnet. Learn how this Android botnet with 300 infected apps was stopped. Continue Reading
The Hajime IoT worm aims to help users tighten up security, whether they want to or not, but it's probably not a good security strategy. Expert Nick Lewis explains the risks. Continue Reading